Index: content/browser/renderer_host/p2p/socket_host_unittest.cc |
=================================================================== |
--- content/browser/renderer_host/p2p/socket_host_unittest.cc (revision 286889) |
+++ content/browser/renderer_host/p2p/socket_host_unittest.cc (working copy) |
@@ -297,7 +297,7 @@ |
// without HMAC value in the packet. |
TEST(P2PSocketHostTest, TestApplyPacketOptionsWithDefaultValues) { |
unsigned char fake_tag[4] = { 0xba, 0xdd, 0xba, 0xdd }; |
- talk_base::PacketOptions options; |
+ rtc::PacketOptions options; |
std::vector<char> rtp_packet; |
rtp_packet.resize(sizeof(kRtpMsgWithAbsSendTimeExtension) + 4); // tag length |
memcpy(&rtp_packet[0], kRtpMsgWithAbsSendTimeExtension, |
@@ -317,7 +317,7 @@ |
// Veirfy HMAC is updated when packet option parameters are set. |
TEST(P2PSocketHostTest, TestApplyPacketOptionsWithAuthParams) { |
- talk_base::PacketOptions options; |
+ rtc::PacketOptions options; |
options.packet_time_params.srtp_auth_key.resize(20); |
options.packet_time_params.srtp_auth_key.assign( |
kTestKey, kTestKey + sizeof(kTestKey)); |
@@ -348,7 +348,7 @@ |
// Verify we update both AbsSendTime extension header and HMAC. |
TEST(P2PSocketHostTest, TestApplyPacketOptionsWithAuthParamsAndAbsSendTime) { |
- talk_base::PacketOptions options; |
+ rtc::PacketOptions options; |
options.packet_time_params.srtp_auth_key.resize(20); |
options.packet_time_params.srtp_auth_key.assign( |
kTestKey, kTestKey + sizeof(kTestKey)); |